Project Website
|
Conference
|
Paper (Arxiv)
This repository is not in its final version, certain documentation sections are still being updated.
The code of this project is organized into two main parts:
To directly use the CAShift dataset, please directly visit our shared online drive
The environment setup instructions and detailed usage guidance can be found in the README files located within each corresponding subdirectory.
We welcome all contributions to improve our dataset, including but not limited to adding new cloud applications, introducing new attack scenarios, and contributing additional baselines, etc. Feel free to submit a pull request :)
Cite as below if you find this repository is helpful to your project:
@article{yu2025cashift,
title = {CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift},
author = {Yu, Jiongchi Yu and Xie, Xiaofei and Hu, Qiang and Zhang, Bowen and Zhao, Ziming and Lin, Yun and Ma, Lei and Feng, Ruitao and Liauw, Frank},
journal = {Proceedings of the ACM on Software Engineering},
year = {2025}
volume = {X},
number = {FSE},
pages = {XXX-XXX},
publisher = {ACM New York, NY, USA}
}
Many thanks to Ruozhao Yang for the support of the web application-based exploit PoCs, and to Jiahao Ying for providing extra computing servers for the benchmarking experiments.
This research is partially supported by the Lee Kong Chian Fellowship, the National Research Foundation, Singapore, and the Cyber Security Agency under its National Cybersecurity R&D Programme (NCRP25-P04-TAICeN). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not reflect the views of National Research Foundation, Singapore and Cyber Security Agency of Singapore.